Chapter 7: Open Security (OPSEC) and Content Filtering


Introduction

Check Point s Open Platform for Security (OPSEC) model enables you to implement third-party vendor applications into your firewall environment. Based on open protocols, the OPSEC model enables vendors to easily design their applications to conform to this standard, and therefore interoperate with the VPN-1/FireWall-1 product.

You may be asking how this can benefit you? The most notable examples are your content filtering options. You can use other vendors virus scanners that support the Content Vectoring Protocol (CVP) (for example, Aladdin s eSafe Protect Gateway) to easily implement virus scanning of Simple Mail Transfer Protocol (SMTP) mail, Hypertext Transfer Protocol (HTTP), and/or File Transfer Protocol (FTP) traffic, just by adding some objects and rules to your Security Policy.

Other content-filtering applications use Website databases, which are broken into categories, so that you can easily block your users from going to specific sites, such as adult entertainment, shopping and chat sites, while on the job. Several schools that provide Internet access for their young students utilize this technology to prevent them from accessing certain categories that are considered inappropriate for children.

We will talk about other OPSEC applications, and show you how to configure CVP and UFP (Universal Resource Identifier (URI) Filtering Protocol) applications in this chapter, and also how you can use the resources available in Check Point VPN-1/FireWall-1 (CP VPN-1/FW-1) to implement limited content filtering without needing a third-party application.




Check Point NG[s]AI
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net